The attackers use phishing and social engineering to trick users into connecting to rogue VPN servers they control. They use ...